- Aug 31, 2016
- 578
CoolNo problem!
I'll post my firewall rules later today...
CoolNo problem!
I'll post my firewall rules later today...
Cool![]()
Thanks for sharing your firewall rules. I like the idea of starting from scratch and then creating only the rules that are absolutely necessary.As promised, here are the incoming rules:
View attachment 147986
And outgoing rules:
View attachment 147987
To get to this point I started by deleting ALL the default rules after I reinstalling Windows. I then use WFC to stop apps auto creating rules on their own (ie: without my consent).
Yes , me too just cutomizing my WF took me a day (research + implementation) .It took me aaaaages to get my AppLocker and Windows Firewall Rules to this stage. I've been researching this for months and I think all the effort has paid off as this build/install/configuration is a pleasure to use so far. ;-)
I'm a big fan of WFC too. Just waiting for a fix for running on the latest Insider buildI'm really pleased with WFC. It's the only third party security software I have installed on the machine so far. It's a fantastic front end to the built in Windows Firewall. I really like the connection log, it makes troubleshooting MUCH easier than reading the firewall log in notepad!
So I've made some changes to my AppLocker Microsoft exception Publisher Rules. I have now added the following so that they cannot run:
I've been thinking about adding regedit.exe to my exception list too so that my SUA can't run the Registry Editor.
- odbcconf.exe
- sdbinst.exe
One thing that's worth doing is disabling Ease of access in Windows as this is such a security hole:
To disable Ease of access on login screen:
Change ownership of c:\windows\system32\utilman.exe to Administrators
cacls c:\windows\system32\utilman.exe /C /D Everyone
cacls c:\windows\syswow64\utilman.exe /C /D Everyone
The next thing I am considering for my secure build is to block/restrict removable devices/drives use Local Group Policy. More on that a bit later ;-)
I'm a big fan of WFC too. Just waiting for a fix for running on the latest Insider build
Really enjoying your updates. You do realise I'm going to let you do all the work and then steal your ideas?![]()
;Set SmartScreen to warn:
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer]
"SmartScreenEnabled"="Prompt"
;Turn off Remote Assistance:
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Remote Assistance]
"fAllowToGetHelp"=dword:00000000
;Turn UAC to max setting:
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System]
"PromptOnSecureDesktop"=dword:00000001
"EnableLUA"=dword:00000001
"ConsentPromptBehaviorAdmin"=dword:00000002
;Enable PUP in Defender:
[HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\MpEngine]
"MpEnablePus"=dword:00000001
;Deny elevation of unsigned executables:
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System]
"ValidateAdminCodeSignatures"=dword:00000001
;Enable Secure Sign in screen (Ctrl + Alt + Del:
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon]
"DisableCAD"=dword:00000000
[HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Winlogon]
"DisableCAD"=-
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System]
"DisableCAD"=-
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System]
"DisableCAD"=-
;Ask for user name and password at log on screen:
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System]
"dontdisplaylastusername"=dword:00000001
;Disable cmd.exe for SUA account:
[HKEY_CURRENT_USER\SOFTWARE\Policies\Microsoft\Windows\System]
"DisableCMD"=dword:00000001
1) Disable Network UI from login screen:
Computer Configuration - Administrative Templates - System - Logon: Change Do not display network selection UI to Enable
2) Disable app notifications on lock screen:
Computer Configuration - Administrative Templates - System - Logon: Change Turn off app notifications on the lock screen to Enable
@ParaXY about the reg tweaks , you should make a batch file and share it![]()
I copied your reg tweaks there : Windows' Security Tweaks
Netsh interface ipv4 set global mldlevel=none
;Disable cmd.exe for current user:
[HKEY_CURRENT_USER\SOFTWARE\Policies\Microsoft\Windows\System]
"DisableCMD"=dword:00000000
Awesome! Many thanks for sharing the efforts of all your research and testing. Much appreciatedAfter tidying up my notes a bit I have attached my registry file (Windows10Customisations.txt) for (most) of the tweaks/changes I have made to my Windows 10 Enterprise setup (including some changes I made this morning). This includes security changes as well as look and feel changes. There is a brief description for each registry modification but if you are going to run this I would review the file first as I'm sure there are many settings that aren't suitable for some people/machines. I'd test it in a VM if you are interested in running this .reg file. NB: Some settings like the telemetry will only work on Enterprise versions.
I'll also include a screenshot of my "Programs and Features" so you can see what I uninstalled after installing Windows 10:
View attachment 148288
Guess I could remove "Windows Fax and Scan".
One change I made this morning was to enable cmd.exe again in the registry since I have an AppLocker rule to block this for my SUA account:
Code:;Disable cmd.exe for current user: [HKEY_CURRENT_USER\SOFTWARE\Policies\Microsoft\Windows\System] "DisableCMD"=dword:00000000
I've also attached a batch file containing some of the services I have disabled called "Services.txt". Basically I disable the following services:
Rename Windows10Customisations.txt to Windows10Customisations.reg and Services.txt to Services.bat.
- Connected User Experiences and Telemetry
- Windows Error Reporting
- dmwappushservice
- SSDP Discovery (UPnP)
- Network Connection Broker
- WinHttpAutoProxySvc
Awesome! Many thanks for sharing the efforts of all your research and testing. Much appreciated![]()
The second one is Applocker attempting to validate the certificates of applications in the Applocker Policies.In my firewall logs I have loads of these outgoing requests being blocked:
View attachment 149456
Does anyone know what these are? Should I leave them blocked or allow them through the firewall?
I did a quick search online but didn't find anything helpful but these two entries seem to be flooding the logs.
So I would expect this needs to be allowed.The service also monitors the local machine trusted root certificate store, and it invokes a user-mode task (%SystemRoot%\System32\AppIdCertStoreCheck.exe) to reverify the certificates at least once per day and whenever there is a change to the certificate store.
The second one is Applocker attempting to validate the certificates of applications in the Applocker Policies.
Microsoft Windows Security | Microsoft Press Store
So I would expect this needs to be allowed.